Question 1. What Is Pptp?
PPTP is the abbreviation for Point-to-Point Tunneling Protocol. It is a protocol or a set of communication rules used for implementing on-demand Virtual Public Networks (VPNs) over the Internet or any other public TCP/IP based network.
PPTP operates at Layer 2 of the OSI model, also called the data-link layer.
Question 2. What’s The Relationship Between Ppp And Pptp?
PPTP is an extension of PPP and uses its negotiation, authentication, and encryption processes.
PPTP encapsulates IP, IPX, or NETBEUI packets into the PPP frame to create a tunnel for secure communication. This tunnel, also called a session, is used for sending private data across WAN or LAN networks, so this information is secure and not visible to unauthorized users.
It can be particularly helpful to send data over unsecure networks.
Question 3. When Pptp Was First Introduced To The World?
PPTP was first introduced to the world in 1995 by a consortium led by Microsoft, 3Com, and others.
It was the first VPN protocol that was supported by the Windows dial-up, and every Microsoft operating support released after 1995 supports it. Other operating systems such as Linux and OS X supported this protocol through native applications.
Today, almost every mobile and desktop platform supports PPTP.
Question 4. Why Is Pptp So Popular?
PPTP is popular due to the following reasons:
- It’s been around for more than 20 years.
- Configuring PPTP is easier than any other protocol.
- It has many different levels of encryption to suit your specific needs.
- It delivers high performance, especially while streaming geo-restricted content.
- Since it encapsulates data, information sent over public networks tends to be safe.
- It requires only a user name, password, and a server address to create a reliable connection with the server.
- It supports up to 128-bit session key encryption that was also developed by Microsoft.
- It uses TCP and GRE.
- It is supported by all current versions of Microsoft, Linux, iOS, Android, Mac OS, Tomato, and other operating systems.
Question 5. What Is Pptp Tunneling?
Tunneling is the process of sending packets through a private network by routing them over a different network such as the Internet. This ensures that other network routers can’t access the computers that are connected to the private network.
Question 6. What Are The Components Involved In A Pptp Deployment?
Three computers are used in any PPTP deployment, and they are a PPTP client, a PPTP server, and a network access server. In some implementations, a PPTP Network Server (PNS) and a PPTP Access Concentrator (PAC) are also used.
Question 7. What Is A Pptp Client?
A PPTP client is a computer that encapsulates PPP packets into IP datagrams to transmit them over the Internet to the PPTP server.
Question 8. What Is A Pptp Server?
- A PPTP server is an intermediary computer that’s connected to both the routing network and private network.
- The role of a PPTP server is to get PPP packets from the routing server, process this packet to get the destination computer’s name or address, and send it through the private network.
- A PPTP server receives the IP datagrams sent by a PPTP client and breaks it down into PPP packets. It decrypts these PPP packets using the private network’s protocol, and routes them accordingly.
- This PPTP server is configured to read multiprotocol packets simply because PPP supports multiple protocols.
Question 9. What Is A Network Access Server?
A network access server is a server that provides Internet access to connected computers. It is designed to handle huge numbers of dial-in clients, so it can help multiple computers to connect to the Internet.
In PPTP, network access servers provide PPP service to support PPTP-enabled clients.
Question 10. How Does Pptp Work?
A PPTP client and a PPTP server use tunneling to route packets through a private network. However, both these computers ensure that they use only those routers that know the address of the private network’s intermediary server, to ensure the packets are secure.
A PPTP client sends a packet through the established tunnel to the PPTP server. In turn, this server gets the destination address and sends it across a private network to the destination computer.
Question 11. Do I Need A Network Access Server To Create A Pptp Tunnel?
You don’t need a network access server when you’re using a PPTP client that’s already connected to the LAN, provided the PPTP server is also connected to the same LAN.
Otherwise, you need a network access server to create a PPTP tunnel.
Question 12. How Can Pptp Clients Establish A Connection To A Pptp Server?
A PPTP client can connect to the PPTP server in two ways:
- Through the ISP’s network access server, provided it supports PPP connections.
- Through a TCP/IP LAN that connects to a PPTP server.
Question 13. What Tunneling Types Does Pptp Support?
PPTP supports two types of tunneling:
- Voluntary tunneling.
- Compulsory tunneling.
Voluntary tunneling doesn’t require any support from ISPs or other network devices such as bridges because it is initiated by the client.
Compulsory tunneling, on the other hand, should be supported by routers or network access servers because it is initiated by a PPTP server.
Question 14. How To Configure Pptp Clients That Use An Isp’s Network Access Server?
- You need a modem and a VPN device to configure PPTP clients with a network access server, as you’ll have to make two separate connections.
- The first connection is a dial-up one that uses a modem to connect to an ISP. This connection uses the PPP protocol.
- The second is a VPN connection that goes over the modem and the ISP, and this uses PPTP. The second connection cannot be established without the first one because you need a PPP connection to the Internet to create a tunnel between two VPN devices.
Question 15. Do I Always Have To Make Two Connections To Create A Vpn Tunnel?
In most cases, yes. The only exception is when you use PPTP to create a VPN connection between computers that are physically connected to the same LAN. In such a case, the PPTP is already connected to the network, so it needs only a dial-up to connect to the PPTP server on the same LAN.
Question 16. What Are The Types Of Pptp Encapsulated Packets?
There are two types of PPTP encapsulated packets — one that handles control information and the other that handles data.
Packets that transport control information use TCP connection. On the other hand, data is transported as a payload in a PPP packet using a modified version of GRE protocol. Also, the payload can be in the form of IP, IPX datagram, AppleTalk, or a NETBEUI frame.
Question 17. How Are Pptp Packets Stored?
PPTP packets are stored based on the location of the PPTP client.
A PPTP packet from a remote PPTP client is moved to the physical media of a telecom device whereas a packet from a LAN PPTP client is stored on the network adapter’s physical media.
Question 18. What Is The Most Common Use Of Pptp?
PPTP is mostly used for enabling VPN remote access over the Internet. To create VPN tunnels using PPTP, launch a PPTP client that connects to your Internet Service provider. In turn, PPTP will create a TCP connection between the VPN client and server to establish the tunnel connection.
Question 19. What Are The Primary Control Messages Used By Pptp?
The following messages are used to create and maintain a tunnel:
- PPTP_START_SESSION_REQUEST — starts the session.
- PPTP_START_SESSION_REPLY — sends a reply to the start sessions request.
- PPTP_ECHO_REQUEST — maintains the session.
- PPTP_ECHO_REPLY — sends a reply to the echo request.
- PPTP_WAN_ERROR_NOTIFY — informs when an error occurs on the PPP connection.
- PPTP_SET_LINK_INFO — configures the connection between PPTP client and server.
- PPTP_STOP_SESSION_REQUEST — Stops the session.
- PPTP_STOP_SESSION_REPLY — sends a reply to the stop sessions request.
Question 20. What Data Encryption Does Pptp Use?
PPTP uses the “shared-secret” encryption process of RAS. Both ends of the connection use the same encryption key, which in this case, is the user password. This password is hashed and stored on both the PPTP client and server. RSA RC4 standard is used to create this 40-bit session key that’s based on the password.
Question 21. Do All Operating Systems Support Pptp?
PPTP VPN clients are built into Windows operating systems, so all versions can access it. PPTP is also available on Mac OS, Linux, and other operating systems through PPTP clients.
Question 22. Can Pptp Support Vpn Connectivity Over A Local Network?
Yes, PPTP supports VPN connectivity over the local network, too. Once you create the tunnel and establish a VPN connection, PPTP enables data packets and control messages to flow through it.
Question 23. Does Microsoft’s Ras Support Pptp?
Yes. Microsoft’s Remote Access Server (RAS) supports PPTP through dial-up and dedicated connections.
To set up Windows NT as a PPTP server,
- Navigate to Networks through Control Panel.
- Open the TCP/IP properties and click on advanced button.
- Choose Enable PPTP Filtering.
Question 24. How Can I Set Up A Pptp Vpn Connection On Windows?
To create a new VPN connection using PPTP:
- In Control Panel, open Networking and Sharing Center on your Windows operating system.
- Click on a link called “Setup a new connection”.
- A window will pop up. In this window, choose the “Connect to a workplace” option and click on the Next button.
- Then, choose the “use my Internet Connection (VPN)” option.
- Input the details of VPN server and give it a local name. You can get this information from your server admin. Using a local name will make it easy to reconnect at a later time.
- Check if you need any other optional settings and finally click the “Create” button.
This should create a new VPN connection for you.
Question 25. Will Pptp Work On Home Routers?
PPTP should work on most modern routers. Older routers do not allow protocol traffic to pass through VPN connections, so they’re not compatible with PPTP.
If you’re unsure, check your router’s documentation. It should have the PPTP port 1723 open and should also support the forwarding of GRE Protocol type 47.
Question 26. Can I Use Pptp With Firewalls?
You can use PPTP with most firewalls. All that you have to do is route the traffic meant for port 1723 to the firewall.
In fact, firewalls enhance the overall security by regulating the data that comes from the Internet to the private network.
Question 27. Can Two Computers Establish A Tunnel Over The Internet?
Yes, two computers can establish a tunnel over the Internet, provided they are running the same network protocol.
This is an important requirement, because PPTP supports many protocols such as IP, IPX and NETBEUI.
Question 28. How Can I Identify Problems In Pptp Over A Tcp/ip Connection?
To troubleshoot PPTP over a TCP/IP connection, check the following:
- Ping your PPTP server to check if you’re connected to it.
- Make sure you have trusted credentials in your PPTP server domain to avoid any security pitfalls.
- You shouldn’t have an active Winsock Proxy client as this can redirect PPTP packets to a proxy server instead of your VPN.
Question 29. What Are The Alternatives To Pptp?
For those worried about PPTP security, there are alternatives to PPTP.
Out of this list, L2TP/IPSec is the closest alternative for PPTP, followed by OpenVPN.
However, none of these protocols is as easy as PPTP to setup. Also, none of these come preinstalled in any operating system.
Question 30. What Is The Difference Between Pptp And L2tp/ipsec Protocols?
There are three key differences between PPTP and L2TP/IPSec. First, encryption process in PPTP begins after the PPP process is completed. This means the PPP authentication is used for this protocol. In L2TP/IPSec, encryption begins before the PPP process begins.
Second, PPTP uses a stream cipher called Microsoft Point to Point Encryption (MPPE) that uses 40, 56, or 128-bit encryption keys. This stream cipher encrypts data as a bit stream. L2TP/IPSec, on the other hand, uses Data Encryption Standard (DES), a block cipher that encrypts data in discrete blocks.
Lastly, PPTP requires only user-level authentication whereas L2TP/IPSec requires both user-level and system-level authentication.
Question 31. Is L2tp/ipsec Better Than Pptp?
In general, L2TP/IPSec is considered to be more secure than PPTP, and this is why some organizations have started using this protocol to implement remote connectivity. In L2TP/IPSec, every packet is checked for data integrity, data authentication, data confidentiality, and replay protection. Effectively, what this means is that every packet is checked to ensure that data was sent by an authorized user, it was not modified in transit, none of the packets are captured without encryption, and a stream of captured packets is not re-sent.
PPTP, on the hand, provides only data confidentiality.
Also, the fact that L2TP/IPSec uses two levels of authentication makes it more secure than PPTP.
Question 32. When Is Pptp Better Than L2tp/ipsec?
There are two situations when PPTP scores over L2TP/IPSec:
- Firstly, PPTP does not require any kind of certificate infrastructure for authenticating computers whereas L2TP/IPSec needs an extensive certificate infrastructure for providing computer certificates to the authenticating server and to all other VPN client computers.
- Secondly, PPTP does not require expensive leased lines for communication as it can send encrypted data over the Internet or public telephone lines. This way, it reduces the cost of deploying an enterprise-wide remote access solution without compromising on security and encryption.
Lastly, PPTP is supported by all Windows platforms, including Windows XP, Windows 2000, Windows NT 4.0, and even older ones like Windows 95, and Windows 98. L2TP/IPSec, on the other hand, is supported only by Windows XP and Windows 2000 VPN clients.
Network Security Interview Questions
Network Security Tutorial
Computer Network Security Interview Questions
Internet Protocol version 6 (IPv6) Tutorial
Firewall Support Interview Questions
Cisco Interview Questions
Internet Protocol version 4 (IPv4) Tutorial
Internet Protocol version 6 (IPv6) Interview Questions
Network Security Interview Questions
Internet Protocol version 4 (IPv4) Interview Questions
Firewall (computing) Interview Questions
Computer Network Security Interview Questions
Cisco Network Engineer Interview Questions
Cisco Asa Firewall Interview Questions
Firewall Support Interview Questions
Network Troubleshooting Interview Questions
Cisco Interview Questions
TCP/IP Interview Questions